THE SECURITY ASSESSMENT TEACHING CASE MODULE *

Size: px
Start display at page:

Download "THE SECURITY ASSESSMENT TEACHING CASE MODULE *"

Transcription

1 THE SECURITY ASSESSMENT TEACHING CASE MODULE * James W. McGuffee St. Edward's University Austin, TX (512) jameswm@stedwards.edu B. Bhagyavati Columbus State University Columbus, GA (706) bhagyavati@columbusstate.edu Jagadeesh Nandigam Grand Valley State University Allendale, MI (616) nandigaj@gvsu.edu Walter W. Schilling, Jr. Milwaukee School of Engineering Milwaukee, WI (414) schilling@msoe.edu ABSTRACT Digital Home is a comprehensive software case study developed by software engineering faculty at Embry-Riddle Aeronautical University. This paper describes the Digital Home case study project, its application to computing education, and the development of a security assessment case module for the case study project. The Security Assessment case module was developed by a team of computing educators from various institutions during the "Teaching with a Software Life-Cycle Case Study" workshop held in June USE OF CASE STUDIES IN SOFTWARE ENGINEERING EDUCATION Over the past decade there have been various proposals to make changes in software engineering education in an attempt to bridge the gap between concepts taught in the academic setting and actual software engineering practice that occurs in industry [1, 2, 7, 8, 9]. One of the major concerns has been that students in the academic classroom have had limited or no exposure to the big picture of developing a complex software project and are unable to grasp the interrelatedness of all the parts involved in the software development process. The use of case studies has been suggested as an appropriate tool to assist in this matter. Specifically, Garg and Varma define a software engineering case as "an account of a software engineering (development) activity event * Copyright 2012 by the Consortium for Computing Sciences in Colleges. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the CCSC copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Consortium for Computing Sciences in Colleges. To copy otherwise, or to republish, requires a fee and/or specific permission. 69

2 JCSC 27, 4 (April 2012) or problem containing background and complexities encountered by a software engineer" [2]. In addition to the usefulness of information and experience provided to the software engineering student, the case study is a useful pedagogical tool in that it encourages active learning. Students are not merely passive recipients of information. Rather, a good case study encourages participation, debate, and a more robust understanding of the material than is possible with the traditional lecture method in software engineering education [3]. Studies have also shown that when given a choice students prefer the case study approach instead of a more traditional lecture approach to software engineering education [2]. Another concern in software engineering education is that students should be exposed to software engineering concepts and ideas throughout the computer science curriculum and should not see software engineering as an isolated set of concepts taught in one or two courses. There is great promise in being able to use the case study approach to present software engineering concepts in a wide variety of computing courses. By having a resource of artifacts and tools a group of students could potentially use a case study to discuss the software engineering implications in almost any computing course they take [4, 6, 9]. In summary, the case study is seen as an effective tool in software engineering education for three main reasons: 1. case studies can help bridge the gap between theory and practice, 2. case studies are an active learning activity, and 3. case studies can be used throughout the computer science curriculum to increase students' exposure to software engineering principles. DIGITAL HOME CASE STUDY PROJECT Faculty and students at Embry-Riddle Aeronautical University developed the Digital Home case study project. The project began in 2006 as part of a National Science Foundation funded project named "The Network Community for Software Engineering Education" (NSF ) [3]. More recently, work on this project has been funded through the National Science Foundation's "Curriculum-wide Software Development Case Study" (DUE ) [6, 10]. There are four major objectives of the Digital Home case study project. The first objective of the project is to produce realistic software development artifacts to provide educators with teaching examples that have a "real world" feel. The second objective of the project is to organize these "real world" artifacts into a set of case modules (or mini case studies) which can be used throughout a computing curriculum. In other words, these case modules aren't to be used solely in the software engineering class. A third objective of the Digital Home case study project is to deliver software development resource materials, which can be adapted by individual educators to allow for variances in teaching and learning styles. This third objective is primarily accomplished through the Software Development Case Study Project website located at <softwarecasestudy.org>. The fourth major objective of the project is to actively engage computing educators in the use, assessment, and development of case study materials. 70

3 CCSC: South Central Conference One of the ways in which this fourth objective was met was through a workshop held on June 13015, 2011 entitled "Teaching with a Software Life-Cycle Case Study Faculty Workshop." It was during this workshop that the authors of this paper met and developed the Security Assessment case module that is described in the next section [3, 5, 10]. Digital Home is a comprehensive case study project that can be used throughout a computing curriculum. There are two main parts of the case study. The first part is a robust set of realistic artifacts. As of June 2011, there were sixteen fully developed artifacts and nine additional artifacts in the process of being developed. The second part of the project is a set of teaching case modules. As of June 2011, there were five fully developed case modules and two in progress. During the workshop in June our team developed an additional case module for the Digital Home case study project. THE SECURITY ASSESSMENT CASE MODULE Below is the full text of the Security Assessment case module developed by our team as part of the "Teaching with a Software Life-Cycle Case Study Faculty Workshop." Case Module: Security Assessment Prerequisite Knowledge: One year of programming in a high-level language. Learning Objectives: Upon completion of this module, students will have increased their ability to: 1. Appreciate security issues inherent in hardware and software due to wireless transmissions. 2. Gain experience in working with real-world technology. 3. Understand the impact of security technology on architecture and design of the system. 4. Prioritize risks, identify vulnerabilities, and provide recommendations. Keywords: access control, authentication, trusted entities, risk analysis Case Study Artifacts*: DH High Level Requirements Definition DH SRS ver1.4 DH Software Design Specification DH Bios *note: These artifacts are available online at <softwarecasestudy.org> Case Study Participants: Li Shen (System Architect Team Leader) Michel Jackson Georgia Magee Sumeera Nangia Massood Zewail 71

4 JCSC 27, 4 (April 2012) Scenario: In late August of 2010, Home Owner Inc. (the largest national retail chain serving the needs of home owners) established a new Digital Home Owner division that was set up to explore the opportunities for equipping and serving "smart houses" (dwellings that integrate smart technology into every aspect of home living). In August and September of 2010, the Marketing Division of Home Owner conducted a needs assessment for a Digital Home product that would provide the computer and communication infrastructure for managing and controlling the "smart" devices into a home to best meet the needs and desires of homeowners. In early September 2010, a five person team was assembled for the project and started a "project launch". After project planning was completed the team began work on requirements analysis and specification. The first version, 1.0, was completed in early October 2010 and versions 1.1 and 1.2 were completed by late October. Jose Ortiz's Facebook account has been recently hacked into. Specifically, inappropriate personal messages were sent to all the friends on his list. He has suddenly developed an intense interest in security. He has asked the Digital Home software team to prepare a security report for the Digital Home project. Exercise: 1. As preparation for the case method, ask each student to read the case study artifacts listed above. 2. Divide the class into a set of teams with five students in each team. Each student takes on a role of one of the case study participants: Li Shen, Michel Jackson, Georgia Magee, Sumeera Nangia, or Massood Zewail. 3. Each team takes on the role of the Digital Home Team and prepares for a meeting with Jose Ortiz. The team should carry out the following activities: a. Analyze the current SRS and identify potential security concerns in the current architecture. b. Create a trust boundary diagram c. Prepare a checklist with recommendation to mitigate security concerns. d. Rework: The author makes changes according to checklist. e. Follow-up: Changes are checked and verified against the diagram and checklist. Appendices: Exercise Booklet Resource Information: 1. McGraw, Gary, Software Security: Building Security In, Addison-Wesley, Maxim, Merritt, and Pollino, David, Wireless Security, McGraw-Hill, Teaching Notes: 1. Class discussion and a reading assignment on trusted entities should proceed the exercise (e.g., from [McGraw] and [Maxim, Pollino]). 2. This case module could be used in different level courses and different types of courses. For example, it could be used in secure software development, security 72

5 CCSC: South Central Conference architecture, computer networks, information assurance technologies, or database and system security classes. 3. Although this case module is designed as a team exercise to be completed in class, there are a couple of other ways the case could be used: a. This could be a teacher-led discussion of the issues related to designing secure software and vulnerabilities in the Digital Home project. The discussion could follow the tasks listed in the above exercise section. b. This case module could be assigned as a team assignment to be completed outside of class. 4. Assuming an adequate student preparation for the exercise, allowing student teams about hours each for the exercise should be sufficient. 5. It would be beneficial to follow the exercise with a ten minute presentation from each team. Some key points to include in the presentation are the following: a. Discuss how the diagram was obtained. b. Discuss how well the checklist protects against the vulnerabilities. c. Students should be aware that instructor will randomly select a student from each team to present the team effort to the rest of the class. 6. A nice extension to this exercise would be to assign a follow-up take home exercise to modify the diagram and the checklist, assuming that Jose Ortiz wants the Digital Home Team to use VPN extensively. CONCLUSION This paper has discussed the motivations and reasons for using case studies in software engineering education. Specifically, the Digital Home case study project was used as a primary example for the approach to using case studies in software engineering education. Finally, the details of a Security Assessment teaching case module that was created by a team of computing educators as part of a National Science Foundation sponsored workshop was presented. REFERENCES 1. Butler, S.A., A client/server case study for software engineering students, 12 th Conference on Software Engineering Education and Training, 156, Garg, K. and Varma, V., A study of the effectiveness of case study approach in th software engineering education," 20 Conference on Software Engineering Education & Training, , Hilburn, T.B., Towhidnejad, M., Nangia. S., and Shen, L., A case study project th for software engineering education, 36 Annual Conference on Frontiers in Education, 105, Hilburn, T.B. and Towhidnejad, M., A case for software engineering, 20 th Conference on Software Engineering Education & Training, , Hilburn, T.B., Massood Towhidnejad, M., and Salamah, S., The Digital Home st case study material, 21 Conference on Software Engineering Education and Training, ,

6 JCSC 27, 4 (April 2012) 6. Hilburn, T.B., Towhidnejad M., and Salamah, S., Read before you write, 24 th IEEE-CS Conference on Software Engineering Education and Training, , Parrish A., Dixon, B., Hale, D., and Hale, J., A case study approach to teaching th component based software engineering, 13 Conference on Software Engineering Education & Training, 140, Runesom, P. and Martin, H., Guidelines for conducting and reporting case study research in software engineering, Empirical Software Engineering, 14, , Towhidnejad, M. and Aman, J.R., Software engineering emphasis in advanced courses, ACM SIGCSE Bulletin, 28, (1), , Towhidnejad, M., Salamah, S., and Hilburn, T.B., softwarecasestudy.org,

A Life-Cycle Engineering Case Study

A Life-Cycle Engineering Case Study A Life-Cycle Engineering Case Study Thomas B. HILBURN, Massood TOWHIDNEJAD, Salamah SALAMAH Department of Electrical, Computer, Software, and Systems Engineering Embry-Riddle Aeronautical University Daytona

More information

AC 2011-1690: REPORTING ON THE USE OF A SOFTWARE DEVELOP- MENT CASE STUDY IN COMPUTING CURRICULA

AC 2011-1690: REPORTING ON THE USE OF A SOFTWARE DEVELOP- MENT CASE STUDY IN COMPUTING CURRICULA AC 2011-1690: REPORTING ON THE USE OF A SOFTWARE DEVELOP- MENT CASE STUDY IN COMPUTING CURRICULA Massood Towhidnejad, Embry-Riddle Aeronautical Univ., Daytona Beach Massood Towhidnejad is a tenure full

More information

INCORPORATING SERVICE LEARNING INTO COMPUTER SCIENCE COURSES *

INCORPORATING SERVICE LEARNING INTO COMPUTER SCIENCE COURSES * INCORPORATING SERVICE LEARNING INTO COMPUTER SCIENCE COURSES * Joo Tan, John Phillips Department of Mathematics and Computer Science Mansfield University of Pennsylvania Mansfield, PA 16933 570 662-4553

More information

An overview of GRCSE: Graduate Reference Curriculum for Systems Engineering

An overview of GRCSE: Graduate Reference Curriculum for Systems Engineering OPEN ACCESS World Congress on Engineering Education 2013 An overview of GRCSE: Graduate Reference Curriculum for Systems Engineering Massood Towhidnejad, Thomas B. Hilburn Department of Electrical, Computer,

More information

Teaching Requirements through Interdisciplinary Projects

Teaching Requirements through Interdisciplinary Projects Teaching Requirements through Interdisciplinary Projects Deepti Suri, Eric Durant Department of Electrical Engineering and Computer Science Milwaukee School of Engineering 1025 North Broadway Milwaukee,

More information

STUDENT PERSPECTIVES ON A REAL WORLD PROJECT

STUDENT PERSPECTIVES ON A REAL WORLD PROJECT STUDENT PERSPECTIVES ON A REAL WORLD PROJECT Sofya Poger, Frances Bailie Computer Science Department Iona College New Rochelle, NY 10801 914 633 2298 spoger@iona.edu, fbailie@iona.edu ABSTRACT This paper

More information

Empirical Development of a Mobile Application: UVA- Wise Undergraduate Software Engineering Capstone Project

Empirical Development of a Mobile Application: UVA- Wise Undergraduate Software Engineering Capstone Project Empirical Development of a Mobile Application: UVA- Wise Undergraduate Software Engineering Capstone Project I. Weissberger, S. Showalter, T. Deel, M. Ward, M. Whitt, and A. Qureshi University of Virginia

More information

SMARTPHONE APPLICATIONS AS SOFTWARE ENGINEERING PROJECTS *

SMARTPHONE APPLICATIONS AS SOFTWARE ENGINEERING PROJECTS * SMARTPHONE APPLICATIONS AS SOFTWARE ENGINEERING PROJECTS * Catherine Stringfellow, Divya Mule Midwestern State University Wichita Falls, TX 76308 +1 (940) 397-4578 catherine.stringfellow@mwsu.edu, divya.mule@yahoo.com

More information

ASSESSING STUDENT LEARNING IN SOFTWARE ENGINEERING *

ASSESSING STUDENT LEARNING IN SOFTWARE ENGINEERING * ASSESSING STUDENT LEARNING IN SOFTWARE ENGINEERING * Taehyung (George) Wang, Diane Schwartz, and Robert Lingard Department of Computer Science California State University Northridge (CSUN) 18111 Nordhoff

More information

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION

INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION INNOVATION IN UNDERGRADUATE COMPUTER SCIENCE EDUCATION Amruth N. Kumar (Moderator) Ramapo College of New Jersey, Mahwah, NJ amruth@ramapo.edu Jack Beidler University of Scranton, PA beidler@scranton.edu

More information

Case Method for Computing Education (CMCE)

Case Method for Computing Education (CMCE) Case Method for Computing Education (CMCE) A Strategy for Teaching Software Engineering Emanuel S. Grant Department of Computer Science University of North Dakota North Dakota, USA grante@aero.und.edu

More information

A Case-Based Approach to Integrating an Information Technology Curriculum

A Case-Based Approach to Integrating an Information Technology Curriculum A Case-Based Approach to Integrating an Information Technology Curriculum Kathleen S. Hartzel 1 William E. Spangler Mordechai Gal-Or Trevor H. Jones A. J. Palumbo School of Business Administration Duquesne

More information

Interoperable Learning Leveraging Building Information Modeling (BIM) in Construction Management and Structural Engineering Education

Interoperable Learning Leveraging Building Information Modeling (BIM) in Construction Management and Structural Engineering Education Interoperable Learning Leveraging Building Information Modeling (BIM) in Construction Management and Structural Engineering Education Eric L. Richards and Caroline M. Clevenger, PhD Colorado State University

More information

Capstone Design via Distance Education A DESIGN Partnership Including Industry and Higher Education

Capstone Design via Distance Education A DESIGN Partnership Including Industry and Higher Education Session 2522 Capstone Design via Distance Education A DESIGN Partnership Including Industry and Higher Education Arnold F. Johnson University of North Dakota Abstract A unique capstone design course was

More information

Incorporating Geographic Information Systems into an MBA Program

Incorporating Geographic Information Systems into an MBA Program Volume 1, Issue 2, 2007 Incorporating Geographic Information Systems into an MBA Program David Gadish, Assistant Professor, California State University Los Angeles, dgadish@calstatela.edu Abstract This

More information

Project Management Certificate (IT Professionals)

Project Management Certificate (IT Professionals) Project Management Certificate (IT Professionals) Whether your field is architecture or information technology, successful planning involves a carefully crafted set of steps to planned and measurable goals.

More information

Bachelor of Science Degree in Education: Athletic Training Major

Bachelor of Science Degree in Education: Athletic Training Major Bachelor of Science Degree in Education: Athletic Training Major College of Education and Human Services Health and Physical Education Department Wright State University Submitted by Luis Tony Ortiz L.ATC;

More information

Research Experience for Undergraduates Emerging Issues in Computer Networking

Research Experience for Undergraduates Emerging Issues in Computer Networking Research Experience for Undergraduates Emerging Issues in Computer Networking Mei Yang, Bhagyavati, and Stan Kurkovsky Department of Computer Science Columbus State University Columbus, GA 31907, USA {yang_mei,

More information

Abstract. Introduction

Abstract. Introduction Database Systems and Oracle: Experiences and Lessons Learned Deborah Dunn Assistant Professor Computer Science Department Stephen F. Austin State University Nacogdoches, TX 75961 (936) 468-2508 ddunn@sfasu.edu

More information

A Project Based Approach for Teaching System Analysis, Design, and Implementation Courses

A Project Based Approach for Teaching System Analysis, Design, and Implementation Courses A Project Based Approach for Teaching System Analysis, Design, and Implementation Courses Nabil A. Yousif 1 and Masoud Naghedolfeizi 2 Abstract-In curricula of Computer Information Systems at Fort Valley

More information

THE UNIVERSITY OF TENNESSEE AT MARTIN DEPARTMENT OF EDUCATIONAL STUDIES

THE UNIVERSITY OF TENNESSEE AT MARTIN DEPARTMENT OF EDUCATIONAL STUDIES THE UNIVERSITY OF TENNESSEE AT MARTIN DEPARTMENT OF EDUCATIONAL STUDIES Instructor: David Dietrich, Ph.D. Office: 219 McWherter, Jackson State Community College, Jackson, TN 38301 Phone: 731.267.2949 or

More information

Programme Specification Foundation Degree (Arts) Business and Enterprise

Programme Specification Foundation Degree (Arts) Business and Enterprise P Programme Specification Foundation Degree (Arts) and Enterprise Valid from: September 2015 Oxford Brookes University Faculty of / (Activate Learning) Reading College 1 SECTION 1: GENERAL INFORMATION

More information

MERGING WORLDS: WHEN VIRTUAL MEETS PHYSICAL AN EXPERIMENT WITH HYBRID LEARNING *

MERGING WORLDS: WHEN VIRTUAL MEETS PHYSICAL AN EXPERIMENT WITH HYBRID LEARNING * MERGING WORLDS: WHEN VIRTUAL MEETS PHYSICAL AN EXPERIMENT WITH HYBRID LEARNING * Esmail Bonakdarian, Todd Whittaker, and Daniel Bell Franklin University 201 S. Grant Ave Columbus, OH 43215 {esmail whittakt

More information

National Standards for Quality Online Teaching

National Standards for Quality Online Teaching National Standards for Quality Online Teaching National Standards for Quality Online Teaching Introduction The mission of the North American Council for Online Learning (NACOL) is to increase educational

More information

EXHIBIT L. Application Development Processes

EXHIBIT L. Application Development Processes EXHIBIT L Application Development Processes Optum Development Methodology Development Overview Figure 1: Development process flow The Development phase consists of activities that include the building,

More information

NETWORK SECURITY DEVELOPMENT PROCESS. - A Framework for Teaching Network Security Courses *

NETWORK SECURITY DEVELOPMENT PROCESS. - A Framework for Teaching Network Security Courses * NETWORK SECURITY DEVELOPMENT PROCESS - A Framework for Teaching Network Security Courses * T. Andrew Yang, Tuan Anh Nguyen Univ. of Houston Clear Lake, Houston, Texas Contact: (281) 283-3835, yang@uhcl.edu

More information

To Catch a Thief: Computer Forensics in the Classroom

To Catch a Thief: Computer Forensics in the Classroom To Catch a Thief: Computer Forensics in the Classroom Anna Carlin acarlin@csupomona.edu Steven S. Curl scurl@csupomona.edu Daniel Manson dmanson@csupomona.edu Computer Information Systems Department California

More information

A Case study based Software Engineering Education using Open Source Tools

A Case study based Software Engineering Education using Open Source Tools A Case study based Software Engineering Education using Open Source Tools Sowmya B J Dept. of CSE M. S. Ramaiah Institute of Technology sowmyabj@msrit.edu Srinidhi Hiriyannaiah Dept. of CSE M.S. Ramaiah

More information

2-Day Workshop Project JumpStart The Workshop Designed to Launch Projects Faster

2-Day Workshop Project JumpStart The Workshop Designed to Launch Projects Faster 2-Day Workshop Project JumpStart The Workshop Designed to Launch Projects Faster Traditional Classroom / Onsite Course No. 665 Duration: 2 days Credits: 14 PDUs / 1.4 CEUs Prerequisites Twelve hours of

More information

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs

ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs ARE YOU READY FOR TOMORROW S IT? Discover ITpreneurs full curriculum of Virtualization and Cloud Computing competence development programs 1 Contact us for more information +1 (800) 214 6371- USA +31 (10)

More information

The case for cases in business communication courses

The case for cases in business communication courses Dynamics of Business Communication The case for cases in business communication courses Roger Graves Director, Writing Across the Curriculum Professor, English and Film Studies The University of Alberta

More information

Continuous Course Improvement, Enhancements, & Modifications: Control & Tracking

Continuous Course Improvement, Enhancements, & Modifications: Control & Tracking Continuous Course Improvement, Enhancements, & Modifications: Control & Tracking Vickie Booth Georgia WebBSIT Vickie@GAWebBSIT.org Larry Booth Clayton State University LarryBooth@clayton.edu Fred Hartfield

More information

Business Analyst Boot Camp Course BA101; 5 Days, Instructor-led

Business Analyst Boot Camp Course BA101; 5 Days, Instructor-led Business Analyst Boot Camp Course BA101; 5 Days, Instructor-led Course Description Full-Spectrum Business Analyst Training and Skills Development. Course Objectives Bridge the expectations gap between

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Real-World Object-Oriented Design Experience for Computer Science Students

Real-World Object-Oriented Design Experience for Computer Science Students Real-World Object-Oriented Design Experience for Computer Science Students Abstract Due to the limitations of time and resources, many undergraduate Software Engineering courses provide a survey of a broad

More information

Assessing the General Education Mathematics Courses at a Liberal Arts College for Women

Assessing the General Education Mathematics Courses at a Liberal Arts College for Women 1 Assessing the General Education Mathematics Courses at a Liberal Arts College for Women AbdelNaser Al-Hasan and Patricia Jaberg Mount Mary College, Milwaukee, WI 53222 alhasana@mtmary.edu jabergp@mtmary.edu

More information

Architecture Centric Development in Software Product Lines

Architecture Centric Development in Software Product Lines Architecture Centric Development in Software Product Lines Aurangzeb Khan DCE, College of E & ME National University of Science and Technology (NUST), Pakistan Farooque Azam DCE, College of E & ME National

More information

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES *

SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * SETTING UP AND USING A CYBER SECURITY LAB FOR EDUCATION PURPOSES * Alexandru G. Bardas and Xinming Ou Computing and Information Sciences Kansas State University Manhattan, KS 66506 bardasag@ksu.edu, xou@ksu.edu

More information

A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW

A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW A LOOK BACK: UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW John C. Knight, Jane C. Prey, & Wm. A. Wulf Department of Computer Science University of Virginia ABSTRACT

More information

Senior Design Project Management Skills

Senior Design Project Management Skills Learning Project Management Skills in Senior Design Courses James M. Conrad 1 and Yesim Sireli 2 University of North Carolina at Charlotte, College of Engineering, 9201 University City Blvd, Charlotte,

More information

TEST PLAN Issue Date: <dd/mm/yyyy> Revision Date: <dd/mm/yyyy>

TEST PLAN Issue Date: <dd/mm/yyyy> Revision Date: <dd/mm/yyyy> DEPARTMENT OF HEALTH AND HUMAN SERVICES ENTERPRISE PERFORMANCE LIFE CYCLE FRAMEWORK CHECKLIIST TEST PLAN Issue Date: Revision Date: Document Purpose The purpose of

More information

Network Security: A Case Study

Network Security: A Case Study Network Security: A Case Study Susan J. Lincke Computer Science Department University of Wisconsin-Parkside Kenosha, WI lincke@uwp.edu Abstract This paper reviews 3 case studies related to network security.

More information

College of Micronesia FSM P.O. Box 159 Kolonia, Pohnpei. Course Outline Cover Page

College of Micronesia FSM P.O. Box 159 Kolonia, Pohnpei. Course Outline Cover Page College of Micronesia FSM P.O. Box 159 Kolonia, Pohnpei Course Outline Cover Page Telephone Systems VTE 280 Course Title Department and Number Course Description: This course is designed to introduce students

More information

The Company Approach to Software Engineering Project Courses

The Company Approach to Software Engineering Project Courses The Company Approach to Software Engineering Project Courses David Broman, Kristian Sandahl and Mohamed Abu Baker Linköping University Pre-Print N.B.: When citing this work, cite the original article.

More information

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute 1 Executive Summary The Ponemon Institute recently conducted a cybersecurity

More information

Online Teaching Evaluation for State Virtual Schools

Online Teaching Evaluation for State Virtual Schools Educational Technology Cooperative Online Teaching Evaluation for State Virtual Schools October 2006 Southern Regional Education Board 592 10th St. N.W. Atlanta, GA 30318 (404) 875-9211 www.sreb.org This

More information

Learning Molecules: ecornell s Approach to Designing Learning Systems (White Paper)

Learning Molecules: ecornell s Approach to Designing Learning Systems (White Paper) Objective ecornell s mission is to help professionals who take our online courses meet their development goals by making available to them first-class content from Cornell University. This white paper

More information

Entrepreneurial Skills Training

Entrepreneurial Skills Training FITT Fostering Interregional Exchange in ICT Technology Transfer www.fitt-for-innovation.eu Except where otherwise noted, this work is licensed under a Creative Commons Attribution 3.0 License. To create

More information

TEACHING COMPUTER ARCHITECTURE THROUGH SIMULATION (A BRIEF EVALUATION OF CPU SIMULATORS) *

TEACHING COMPUTER ARCHITECTURE THROUGH SIMULATION (A BRIEF EVALUATION OF CPU SIMULATORS) * TEACHING COMPUTER ARCHITECTURE THROUGH SIMULATION (A BRIEF EVALUATION OF CPU SIMULATORS) * Timothy Stanley, PhD Computer and Network Sciences, Utah Valley University, Orem, Utah 84058, 801 863-8978, TStanley@uvu.edu

More information

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION................................ 3 UNDERSTAND YOUR CURRENT SITUATION............ 4 DRAW

More information

ERP / LOGISTICS TRAINING USING COMPUTER BASED TRAINING TOOLS: A VIRTUALIZATION MODEL FOR SAP

ERP / LOGISTICS TRAINING USING COMPUTER BASED TRAINING TOOLS: A VIRTUALIZATION MODEL FOR SAP ERP / LOGISTICS TRAINING USING COMPUTER BASED TRAINING TOOLS: A VIRTUALIZATION MODEL FOR SAP Sam Khoury College of Business Athens State University Sam.Khoury@athens.edu Kouroush Jenab Education Chair,

More information

Module Overview USING SOCIAL MEDIA IN BUSINESS. Personal Information

Module Overview USING SOCIAL MEDIA IN BUSINESS. Personal Information USING SOCIAL MEDIA IN BUSINESS MODULE OUTLINE DURATION: 22 nd July to 9 th August 2013: 6 sessions of two hours MODULE LEADER: David Kirkham, TD, BA, MSc, PhD E: david.kirkham@calistroconsultants.com T:

More information

Establishing a Data-Centric Approach to Encryption

Establishing a Data-Centric Approach to Encryption Establishing a Data-Centric Approach to Encryption Marcia Kaufman, COO and Principal Analyst Sponsored by Voltage Security Voltage Security: Many data breaches occur at companies that already have a data

More information

GRADUATE STUDENT SATISFACTION WITH AN ONLINE DISCRETE MATHEMATICS COURSE *

GRADUATE STUDENT SATISFACTION WITH AN ONLINE DISCRETE MATHEMATICS COURSE * GRADUATE STUDENT SATISFACTION WITH AN ONLINE DISCRETE MATHEMATICS COURSE * Amber Settle DePaul University 243 S. Wabash Avenue Chicago, IL 60604 (312) 362-5324 asettle@cti.depaul.edu Chad Settle University

More information

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013 2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Course Description for IT Supervisory Themes and Emerging Topics (S&R Technology Lab)

Course Description for IT Supervisory Themes and Emerging Topics (S&R Technology Lab) Federal Reserve Board of Governors Course Description for IT Supervisory Themes and Emerging Topics (S&R Technology Lab) Last Revised: June 2009 STREAM Supervision Technology Risks Educate, Analyze and

More information

Pedagogical Use of Tablet PC for Active and Collaborative Learning

Pedagogical Use of Tablet PC for Active and Collaborative Learning Pedagogical Use of Tablet PC for Active and Collaborative Learning Oscar Martinez Bonastre oscar.martinez@umh.es Antonio Peñalver Benavent a.penalver@umh.es Francisco Nortes Belmonte francisco.nortes@alu.umh.es

More information

Lessons Learned from the Teaching of IS Development

Lessons Learned from the Teaching of IS Development Journal of Information Technology Education Volume 1 No. 2, 2002 Lessons Learned from the Teaching of IS Development Filomena Lopes and Paula Morais Universidade Portucalense, Porto, Portugal flopes@upt.pt

More information

Building Future Leaders

Building Future Leaders Building Future Leaders Select AIA Component Leadership Programs AIA components across the United States have recently launched a number of leadership curricula to strengthen their local governance and

More information

Maximizing Retention in Engineering/Engineering Technology

Maximizing Retention in Engineering/Engineering Technology Maximizing Retention in Engineering/Engineering Technology Elaine L. Craft, Director and Principal Investigator, South Carolina Advanced Technological Education Center of Excellence Abstract To maximize

More information

EXPERIENCES WITH A REAL PROJECTS FOR REAL CLIENTS COURSE ON SOFTWARE ENGINEERING AT A LIBERAL ARTS INSTITUTION *

EXPERIENCES WITH A REAL PROJECTS FOR REAL CLIENTS COURSE ON SOFTWARE ENGINEERING AT A LIBERAL ARTS INSTITUTION * EXPERIENCES WITH A REAL PROJECTS FOR REAL CLIENTS COURSE ON SOFTWARE ENGINEERING AT A LIBERAL ARTS INSTITUTION * Vincent A. Cicirello Richard Stockton College 101 Vera King Farris Drive Galloway, NJ 08205

More information

Essential Elements of a Quality Visual and Performing Arts Program

Essential Elements of a Quality Visual and Performing Arts Program Essential Elements of a Quality Visual and Performing Arts Program Developed by the South Carolina District Arts Coordinators (SCDAC) with support from and in collaboration with the South Carolina Department

More information

The Clute Institute International Academic Conference Munich, Germany 2014

The Clute Institute International Academic Conference Munich, Germany 2014 Utilizing Enterprise Resource Planning Software In Pedagogical Integration Of Accounting And Information Systems Dmitriy V. Chulkov, Indiana University Kokomo, USA Joung Yeon Kim, Indiana University Kokomo,

More information

Master of Interior Architecture Program

Master of Interior Architecture Program Course Title: Degree Offered (in full): (abbr.): Master of Interior Architecture Program Master of Interior Architecture Program Master of Interior Architecture M.I.A. Responsible Organization The Interior

More information

ENTERPRISE ENHANCED EDUCATION: An Information Technology Enabled Extension of Traditional Learning Environments1

ENTERPRISE ENHANCED EDUCATION: An Information Technology Enabled Extension of Traditional Learning Environments1 ENTERPRISE ENHANCED EDUCATION: An Information Technology Enabled Extension of Traditional Learning Environments1 Michael C. Mulder University of Nebraska mmulder@nsf.gov Gordon E. Stokes Brigham Young

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 4, Jul-Aug 2015

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 4, Jul-Aug 2015 RESEARCH ARTICLE Software Quality Management Measured Based Code Assessments Salman Zakariya [1], Mohammed Belal [2] Department of Computer Science Helwan university, Cairo, Egypt [1] & [2] OPEN ACCESS

More information

Gender Differences in Computer Technology Achievement

Gender Differences in Computer Technology Achievement Gender Differences in Computer Technology Achievement Kimberly V. Hale Abstract This study examined gender differences in computer technology achievement. The setting was a central Georgia middle school.

More information

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS *

CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * CYBER DEFENSE COMPETITION: A TALE OF TWO TEAMS * Yan Bei and Robert Kesterson Institute of Technology University of Washington, Tacoma Tacoma, WA 253-692-5863 yanb@u.washington.edu Kyle Gwinnup and Carol

More information

An Information Systems Project Management Course Using a Client-Based Model

An Information Systems Project Management Course Using a Client-Based Model Association for Information Systems AIS Electronic Library (AISeL) SAIS 2004 Proceedings Southern (SAIS) 3-1-2004 An Information Systems Project Management Course Using a Client-Based Model Randall McCoy

More information

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics

RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE. CISY-274 Privacy, Ethics & Computer Forensics RARITAN VALLEY COMMUNITY COLLEGE COURSE OUTLINE CISY-274 Privacy, Ethics & Computer Forensics I. Basic Course Information A. Course Number & Title: CISY-274 - Privacy, Ethics, & Computer Forensics B. New

More information

Extended Career and Life Role Assessment System

Extended Career and Life Role Assessment System Extended Career and Life Role Assessment System Based on the Career Related Learning Standards identified with the CAM Administration Manual 2002-2003 Developed for the Oregon Department of Education through

More information

UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW

UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW UNDERGRADUATE COMPUTER SCIENCE EDUCATION: A NEW CURRICULUM PHILOSOPHY & OVERVIEW John C. Knight, Jane C. Prey, & Wm. A. Wulf Department of Computer Science University of Virginia Charlottesville, VA 22903

More information

Management Information Systems: International Edition, 11/E

Management Information Systems: International Edition, 11/E 1 of 5 13-10-2009 17:47 Send To Printer Close Window Management Information Systems: International Edition, 11/E Ken Laudon Jane Laudon Publisher: Pearson Higher Education Copyright: 2010 Format: Paper;

More information

MADELEINE (LYNN) FOORD, PH.D., M.ED., PT 617-643-0875 * lfoord@mghihp.edu

MADELEINE (LYNN) FOORD, PH.D., M.ED., PT 617-643-0875 * lfoord@mghihp.edu Enthusiastic educational professional with proven track record in faculty development, adult and student learning, program development and leadership, integration of learning technologies, and assessment.

More information

DEVELOPMENT OF PROJECT DOCUMENTATION: KEY INGREDIENT IN TEACHING SYSTEMS ANALYSIS AND DESIGN

DEVELOPMENT OF PROJECT DOCUMENTATION: KEY INGREDIENT IN TEACHING SYSTEMS ANALYSIS AND DESIGN DEVELOPMENT OF PROJECT DOCUMENTATION: KEY INGREDIENT IN TEACHING SYSTEMS ANALYSIS AND DESIGN Mohammad A. Rob, University of Houston Clear Lake, rob@uhcl.edu ABSTRACT Systems Analysis and Design (SAD) is

More information

ANNUAL PROGRAM/DEPARTMENT ASSESSMENT PLAN

ANNUAL PROGRAM/DEPARTMENT ASSESSMENT PLAN ANNUAL PROGRAM/DEPARTMENT ASSESSMENT PLAN Please send your Plan to the Assessment Office via assessment@cscc.edu (Phone 287-3936) by MONDAY, OCTOBER 17, 2011 Copies of the Plans will be distributed to

More information

Incorporating Concrete Canoe & Steel Bridge Planning into a Construction Management Course

Incorporating Concrete Canoe & Steel Bridge Planning into a Construction Management Course Session 1621 Incorporating Concrete Canoe & Steel Bridge Planning into a Construction Management Course Brian L. Houston University of Pittsburgh at Johnstown Introduction Many faculty members would agree

More information

OPM LEADERSHIP DEVELOPMENT MATRIX:

OPM LEADERSHIP DEVELOPMENT MATRIX: 1 OPM LEADERSHIP DEVELOPMENT MATRIX: The following Leadership Development Matrix is part of OPM s Effective Learning Interventions for Developing ECQs report. The Matrix lists a range of leadership development

More information

The Changing Relationship Between Software Engineering and College Entrees

The Changing Relationship Between Software Engineering and College Entrees Recent Trends in Graduate Software Engineering Mark Ardis (Moderator) Stevens Institute of Technology mark.ardis@stevens.edu Dick Fairley Colorado Technical University d.fairley@computer.org Tom Hilburn

More information

LDAP Authentication Configuration Appendix

LDAP Authentication Configuration Appendix 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard

More information

Integrating Risk Management into an Undergraduate Software Engineering Course

Integrating Risk Management into an Undergraduate Software Engineering Course Integrating Risk Management into an Undergraduate Software Engineering Course James S. Collofello Department of Computer Science and Engineering Tempe, Arizona 85287-5406 collofello@asu.edu Andrew K. Pinkerton

More information

A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud

A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud A PLM Certificate Program Update: Teaching PLM Online Using VMs in the Cloud A. B. Mueller Department of Computer Graphics Technology Purdue University Abstract Purdue University Department of Computer

More information

Design of automatic testing tool for railway signalling systems software safety assessment

Design of automatic testing tool for railway signalling systems software safety assessment Risk Analysis VI 513 Design of automatic testing tool for railway signalling systems software safety assessment J.-G. Hwang 1, H.-J. Jo 1 & H.-S. Kim 2 1 Train Control Research Team, Korea Railroad Research

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

Proposed K-12 Online Teaching Endorsement Program of Study

Proposed K-12 Online Teaching Endorsement Program of Study FS-15-004 TO: University Curriculum Committee FROM: College of Education RE: New Teaching Minor DATE: September 10, 2014 The College of Education is requesting university approval of a new teaching endorsement.

More information

Assessing the Impact of a Tablet-PC-based Classroom Interaction System

Assessing the Impact of a Tablet-PC-based Classroom Interaction System STo appear in Proceedings of Workshop on the Impact of Pen-Based Technology on Education (WIPTE) 2008. Assessing the Impact of a Tablet-PC-based Classroom Interaction System Kimberle Koile David Singer

More information

STUDENT CENTERED INSTRUCTIONAL DESIGN FOR E-LEARNING CONTENT LEARNING MANAGEMENT SYSTEM (LMS)

STUDENT CENTERED INSTRUCTIONAL DESIGN FOR E-LEARNING CONTENT LEARNING MANAGEMENT SYSTEM (LMS) Proceedings of the 2 nd International Conference of Teaching and Learning (ICTL 2009) INTI University College, Malaysia STUDENT CENTERED INSTRUCTIONAL DESIGN FOR E-LEARNING CONTENT LEARNING MANAGEMENT

More information

Industry Involvement in the Women in Applied Science and Engineering (WISE) Recruiting and Retention Programs

Industry Involvement in the Women in Applied Science and Engineering (WISE) Recruiting and Retention Programs Industry Involvement in the Women in Applied Science and Engineering (WISE) Recruiting and Retention Programs Shawna Fletcher, Mary R. Anderson-Rowland, and Stephanie Blaisdell Women in Applied Science

More information

NATIONAL CURRICULUM STATEMENT GRADES 10-12 SUBJECT: INFORMATION TECHNOLOGY

NATIONAL CURRICULUM STATEMENT GRADES 10-12 SUBJECT: INFORMATION TECHNOLOGY NATIONAL CURRICULUM STATEMENT GRADES 10-12 SUBJECT: INFORMATION TECHNOLOGY TEACHER TRAINING MANUAL 2006 PROGRAMME 3 SESSION 1 Introducing the National Curriculum Statement (NCS) and the National Senior

More information

CyberNEXS Global Services

CyberNEXS Global Services CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS

More information

Data Management Maturity Model. Overview

Data Management Maturity Model. Overview Data Management Maturity Model Overview UPMC Center of Excellence Pittsburgh Jul 29, 2013 Data Management Maturity Model - Background A broad framework encompassing foundational data management capabilities,

More information

THE INCLUSION OF PROJECT MANAGEMENT COMPONENTS IN UNDERGRADUATE INFORMATION SYSTEMS CURRICULA

THE INCLUSION OF PROJECT MANAGEMENT COMPONENTS IN UNDERGRADUATE INFORMATION SYSTEMS CURRICULA THE INCLUSION OF PROJECT MANAGEMENT COMPONENTS IN UNDERGRADUATE INFORMATION SYSTEMS CURRICULA Harry Reif, James Madison University, reifhl@jmu.edu Michael Mitri, James Madison University, mitrimx@jmu.edu

More information

Ethical Dilemmas in Teaching Computer and Internet Security

Ethical Dilemmas in Teaching Computer and Internet Security Ethical Dilemmas in Teaching Computer and Internet Security Brian Tompsett Department of Computer Science, University of Hull b.c.tompsett@hull.ac.uk Abstract. This paper could be subtitled "Are we teaching

More information

Knowledge Base Data Warehouse Methodology

Knowledge Base Data Warehouse Methodology Knowledge Base Data Warehouse Methodology Knowledge Base's data warehousing services can help the client with all phases of understanding, designing, implementing, and maintaining a data warehouse. This

More information

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Module: Computer Literacy Knowing how to use a computer has become a necessity for many people.

More information

Curriculum Multimedia Designer

Curriculum Multimedia Designer Curriculum Multimedia Design and Communication programme Local part Curriculum Multimedia Designer Academy Profession Programme (AP) in Multimedia Design and Communication National Curriculum issued by

More information

Texas Education Review

Texas Education Review Texas Education Review Leading Change with Technology-enhanced Education at The University of Texas at Austin: Five Guiding Principles William Powers, Jr., JD President, The University of Texas at Austin

More information

A PRELIMINARY REPORT ON ADAPTING SOFTWARE DEVELOPMENT INDUSTRY BEST PRACTICES FOR UNDERGRADUATE CLASSROOM USE

A PRELIMINARY REPORT ON ADAPTING SOFTWARE DEVELOPMENT INDUSTRY BEST PRACTICES FOR UNDERGRADUATE CLASSROOM USE 1 Abstract A PRELIMINARY REPORT ON ADAPTING SOFTWARE DEVELOPMENT INDUSTRY BEST PRACTICES FOR UNDERGRADUATE CLASSROOM USE Rajendran Swamidurai, David Umphress Alabama State University/Auburn University

More information

One Ticket to the Matinee Please: A Case Designed to Teach Students Accounting Software (Peachtree) Skills

One Ticket to the Matinee Please: A Case Designed to Teach Students Accounting Software (Peachtree) Skills One Ticket to the Matinee Please: A Case Designed to Teach Students Accounting Software (Peachtree) Skills Volume 6, Number 1 2011 page 59-65 David C. Hayes James Madison University, hayesdc@jmu.edu, tel.

More information

A Software and Systems Integration Framework for Teaching Requirements

A Software and Systems Integration Framework for Teaching Requirements Paper ID #9429 A Software and Systems Integration Framework for Teaching Requirements Engineering Radu F. Babiceanu, Embry-Riddle Aeronautical University Dr. Radu Babiceanu is an Associate Professor with

More information